Journal: Computers & Security

Volume 14, Issue 8

660 -- 666Harold Joseph Highland. Random bits & bytes
667 -- 674Charles Cresson Wood. Writing infosec policies
675 -- 680Rebecca J. Duncan. There are some cracks in the cornerstone of information security
681 -- 690Christopher L. J. Holloway. Controlling digital signature services using a smartcard
691 -- 695Kenneth R. Lindup. A new model for information security policies
707 -- 717Love Ekenberg, Subhash Oberoi, István Orci. A cost model for managing information security hazards
719 -- 738Marshall D. Abrams, Marvin V. Zelkowitz. Striving for correctness